E. Stewart Lee

According to our database1, E. Stewart Lee authored at least 28 papers between 1970 and 2004.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2004
Hard Real-Time Communication with the Timed Token Protocol: Current State and Challenging Problems.
Real Time Syst., 2004

2002
Testing the Schedulability of Synchronous Traffic for the Timed Token Medium Access Control Protocol.
Real Time Syst., 2002

2001
Determining the Worst-case Synchronous Message Response Time in FDDI Networks.
Comput. J., 2001

2000
Effect of nodes reordering on the schedulability of real-time messages in timed token networks.
IEEE Commun. Lett., 2000

The nonoptimality of synchronous bandwidth allocation schemes for the timed token protocol.
IEEE Commun. Lett., 2000

1999
Composing Security Properties.
Proceedings of the Security Protocols, 1999

Efficient Global Allocation of Synchronous Bandwidths for Hard Real-Time Communication with the Timed Token MAC Protocol.
Proceedings of the 6th International Workshop on Real-Time Computing and Applications Symposium (RTCSA '99), 1999

The Worst-Case Scenario for Transmission of Synchronous Traffic in an FDDI Network.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999

Pricing for Differentiated Internet Services.
Proceedings of the Interactive Distributed Multimedia Systems and Telecommunication Services, 1999

Digital Copy Protection Scheme Using Recording Medium Identifier.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Finding the minimum available transmission time for the timed token medium access control protocol.
Proceedings of the 11th Euromicro Conference on Real-Time Systems (ECRTS 1999), 1999

1998
Panel Session - Future Directions.
Proceedings of the Security Protocols, 1998

Composing Secure Systems that have Emergent Properties.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
A General Theory of Security Properties.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

1996
How and why feedback composition fails [secure systems].
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996

1995
The Composability of Non-Interference.
J. Comput. Secur., 1995

The composability of non-interference [system security].
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1994
The Compatibility of Policies.
Proceedings of the CCS '94, 1994

1992
Reducing the Proliferation of Passwords in Distributed Systems.
Proceedings of the Education and Society, 1992

Verification and Modelling of Authentication Protocols.
Proceedings of the Computer Security, 1992

1990
Using Deducibility in Secure Network Modelling.
Proceedings of the ESORICS 90, 1990

An Architecture for a Trusted Network.
Proceedings of the ESORICS 90, 1990

1988
Transforming bit-serial communication circuits into fast parallel VLSI implementations.
IEEE J. Solid State Circuits, April, 1988

HUBNET performance measurement.
IEEE J. Sel. Areas Commun., 1988

1983
The Principles and Performance of Hubnet: A 50 Mbit/s Glass Fiber Local Area Network.
IEEE J. Sel. Areas Commun., 1983

Bus, ring, star and tree local area networks.
Comput. Commun. Rev., 1983

1979
Experience with OLGA A Maximal language for the minimal PDP-11 minicomputer.
Proceedings of the 10th SIGCSE Technical Symposium on Computer Science Education, 1979

1970
A Many-Valued Algebra for Switching Systems.
IEEE Trans. Computers, 1970


  Loading...